Skip to main content

Eureka HTB Walkthrough

Eureka Hack the Box HTB Machine Walkthrough Writeup

Welcome to another Hack the Box walkthrough. In this blog post, I have demostrated how I owned the Eureka machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs. You can also test and grow your penetration testing skills, from gathering information to reporting. If you are new to this blog, please do not forget to like, comment and subscribe to my YouTube channel and follow me on LinkedIn for more updates.


About the Machine

Eureka is a hard Linux machine which incorporated a password leakage in heapdump and a vulnerability in the Eureka service on the intranet port, by registering a fake microservice instance and obtaining user credentials. The Linux machine also feature an array comparison vulnerability by modifying a log file to achieve privilege escalation.

The first step in pwning the Eureka machine like I have always done in my previous writeups is to connect my Kali Linux terminal with Hack the Box server. To establish this connection, I ran the following command in the terminal:

sudo openvpn eureka.ovpn

After the connection has been set up, I started the target machine, and I was assigned an IP address of 10.10.11.66.

Eureka 10.10.11.66 Hack the Box HTB Writeup Walkthrough

I kicked things off with an Nmap scan to see what services the target was running:
nmap eureka.htb -sV -A

The scan quickly revealed that the box was alive and exposing just two services:

  • Port 22 (SSH) – running OpenSSH 8.2p1 on Ubuntu. While SSH is always useful for eventual access, it typically requires valid credentials or a private key, so I noted it down for later.
  • Port 80 (HTTP) – served by nginx 1.18.0. Interestingly, the HTTP title indicated a redirect to another virtual host: http://furni.htb/. This suggested the presence of a vhost setup, and likely meant I’d need to add furni.htb to my /etc/hosts file before I could explore the web application properly.

The OS fingerprinting also hinted at the target running a Linux 5.x kernel, with possible traces of MikroTik RouterOS signatures (likely a false positive due to overlapping TCP/IP fingerprints). The traceroute confirmed the host was just two hops away on the HackTheBox network.

At this point, the real lead was the web server and its furni.htb virtual host, which looked like the intended attack surface. SSH would remain on the backburner until I uncovered credentials through web exploitation or enumeration.


Since the Nmap scan revealed that the web server on eureka.htb was redirecting to furni.htb, I suspected the target was using virtual hosting. By default, my system wouldn’t know how to resolve that hostname, so I had to manually map it to the target’s IP address.

I edited the /etc/hosts file to include both domains:

sudo nano /etc/hosts Eureka HTB Machine Walkthrough

and added the following line:
10.10.11.66 eureka.htb furni.htb

This ensured that whenever I visited http://furni.htb/ in my browser, it would resolve directly to the machine’s IP on the HackTheBox network. With this step complete, I was ready to start enumerating the web application hosted on furni.htb.

With the furni.htb domain mapped in /etc/hosts, I browsed to the site and was greeted with what appeared to be a fully functional furniture e-commerce platform.

furni.htb 10.10.11.66 eureka.htb

The landing page branded itself as “Furni. – Modern Interior Design Studio”, showcasing different categories of furniture, a shopping cart, and even a checkout process. From the look of it, the site was built to mimic a legitimate online store.

Key features stood out immediately:

  • User Registration & Login – suggesting some form of authentication system that could potentially be abused if implemented insecurely.
  • Shopping Cart & Checkout – users could add items to their cart and proceed with purchases.
  • Dynamic Content – several links like ShopAbout UsServicesBlog, and Register indicated that the site might have multiple endpoints worth enumerating.

At this stage, however, nothing on the front page appeared directly vulnerable. The registration and purchase functionality worked as expected, but didn’t immediately reveal an exploit vector. This meant the real attack surface was likely hidden deeper — either in unlisted directoriesAPI endpoints, or backend services tied to the site.

The next logical step was to begin enumerating directories and subpages with a tool like dirsearch, ffuf or gobuster, hoping to uncover something the developers hadn’t meant to expose.


dirsearch -u http://furni.htb/ -e php,html,txt -t 50

The scan turned out to be very fruitful. Alongside the expected pages like /about, /shop, /services, /register, and /login, I stumbled upon something far more interesting:

  • A whole set of Spring Boot Actuator endpoints under /actuator/. These are debugging and monitoring routes that developers usually forget to lock down. The scan revealed endpoints such as /actuator/env, /actuator/beans, /actuator/configprops, /actuator/mappings, /actuator/metrics, and even /actuator/heapdump.
  • These are goldmines in CTFs (and real-world pentests) because they often expose sensitive information about the application’s environment, configuration, or even memory contents.
  • The /blog directory also stood out, but it seemed to just host regular content with no immediate vulnerabilities.
  • Shopping features like /cart, /checkout, and /comment redirected unauthenticated users back to /login, confirming that these actions required valid credentials.

Eureka HTB Writeup

The big takeaway here was the exposed Spring Actuator panel. Among the various endpoints, /actuator/env looked particularly promising since it often leaks environment variables — including database credentials, API keys, or internal service URLs. Even more striking was /actuator/heapdump, which produced a massive 76MB file — a strong indication that memory contents of the running application could be downloaded.

At this point, I knew the path forward: enumerate the Actuator endpoints to hunt for secrets that could help me move deeper into the system.

Eureka HTB Walkthrough

Eureka Hack the Box Walkthrough

With the exposed Spring Boot Actuator endpoints in sight, I decided to start with /actuator/env. This endpoint is known for dumping application environment variables and configuration values.
Visiting:
http://furni.htb/actuator/env Eureka HTB Machine Walkthrough

returned a detailed JSON output containing the server’s environment configuration. Buried within the noise were sensitive values — things like database connection strings, usernames, and API keys. This was a clear indication that the developers had left debugging enabled in production. Such information could easily be leveraged to gain deeper access into the system.

Next, I turned to the most dangerous of the lot:

http://furni.htb/actuator/heapdump

This endpoint allowed me to download a massive 76MB .hprof file. A heap dump is essentially a snapshot of the application’s memory at runtime, and analyzing it can reveal plaintext secrets — usernames, passwords, session tokens, and other sensitive data that were loaded in memory at the time of the dump.

In a real-world attack, this kind of leak would be critical, as an attacker could mine the dump for authentication credentials or other exploitable tokens. In the context of this CTF, it was clear that the heap dump would contain something I could use to pivot further into the machine.

With the heap dump in hand, I set out to mine it for sensitive information. Heap dumps are memory snapshots of a running Java application, so it’s common to find credentials, API tokens, or session data lingering inside.

To keep things simple, I used the strings command to extract readable text from the dump and then grepped for anything related to passwords:

strings heapdump | grep -i "password=" Eureka Hack the Box Machine Walkthrough

Sure enough, this paid off quickly. Among the output, I spotted a clear-text credential pair:

This gave me a username: oscar190 and a password: 0sc@r190_S0l!dP@sswd.

It looked like I had struck gold — valid credentials that could be reused either on the website’s login form or, even better, through SSH access since port 22 was open. The next step was obvious: try these credentials against the available services to see where they would get me in.

Armed with the credentials from the heap dump (oscar190 : 0sc@r190_S0l!dP@sswd), I moved on to test them against the SSH service exposed on port 22. With the credentials oscar190 : 0sc@r190_S0l!dP@sswd in hand, I attempted a direct SSH connection to the target:

ssh oscar190@furni.htb Eureka Hack the Box Writeup

On the first connection, SSH prompted me to verify the host’s fingerprint. Since this was my initial login to the box, I confirmed the authenticity and permanently added furni.htb to my list of known hosts.

After entering the password, I successfully authenticated as oscar190 and landed on a shell running Ubuntu 20.04.6 LTS with kernel 5.4.0-214-generic.

At this stage, I had achieved an initial foothold on the target as a low-privileged user. The next phase of the attack would focus on enumerating the system to uncover privilege escalation paths — such as checking for sudo permissions, cron jobs, misconfigured services, or sensitive files left behind by the developers.

Eureka Hack the Box HTB Machine Walkthrough

a
b

Eureka Hack the Box HTB Machine Walkthrough






127.0.0.1:8761




localhost:8761/eureka/apps





miranda-wise@eureka Eureka HTB Machine Solution



oscar190@eureka


nc -lvnp 8080





cat user.txt Eureka HTB Solution

a
b
c

Hack the Box Walkthrough user flag

a
b
c

ls -al Eureka HTB Hack the Box Machine Writeup Walkthrough

d
e
f
1.

cat log_analyse.sh

2.
Eureka Hack the Box Walkthrough




3.

Eureka Hack the Box Writeup

4.

Eureka HTB Writeup

5.
Eureka HTB Walkthrough


6.

cd /var/www/web/cloud-gateway/log eureka htb walkthrough
z
a
b
c
d
e
f
cat /root/root.txt

If you enjoy reading my walkthrough, do not forget to like, comment, and subscribe to my YouTube channel and also connect with me on LinkedIn. Also, don't forget to turn on post notification on my YouTube channel and medium to get notification as soon as I write.

Subscribe to my YouTube channel: https://www.youtube.com/@BoltechTechnologies1
Follow me on Medium: https://medium.com/@boltech
Follow me on Twitter: https://x.com/Isiaq_Ibrahim99
Follow me on Twitter: https://x.com/BoltechNG

Comments

Popular posts from this blog

Fluffy HTB Walkthrough

Welcome to another Hack the Box exercise. In this blog post, I will show you how I pwned the Fluffy machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs. You can also test and grow your penetration testing skills, from gathering information to reporting. If you are new to this blog, please do not forget to like, comment, and subscribe to my YouTube channel ( https://www.youtube.com/@BoltechTechnologies1 ) and also follow me on LinkedIn ( https://www.linkedin.com/in/isiaq-ibrahim-468588156/ ) for more updates. About the Machine Fluffy is an easy-rated Windows machine on Hack the Box that takes players through a well-structured series of Active Directory exploitation techniques, emphasizing real-world misconfigurations in a corporate domain environment. The box begins with SMB enumeration using valid credentials to access interesting files, including a PDF that references a real-world CVE—CVE-2025-...

TombWatcher HTB Walkthrough

Hello and welcome to another Hack the Box walkthrough. In this blog post, I am going to show you how to pwn the TombWatcher machine on hack the box. If you are new to this channel, please don’t forget to like, comment, and subscribe to my YouTube channel for more awesome content. Also, don’t forget to follow me on LinkedIn and X for more HTB walkthrough and cybersecurity related contents.   About the Machine TombWatcher is a medium-difficulty Windows Active Directory machine that challenges players to exploit misconfigurations in Active Directory Certificate Services (AD CS). The initial foothold is gained through enumeration of vulnerable certificate templates, specifically one that allows low-privileged users to enroll certificates with the Certificate Request Agent application policy. This enables an ESC1-style attack, where a user (cert_admin) can request a certificate on behalf of a high-privileged account like Administrator, ultimately leading to domain compromise. Ad...

Puppy HTB Walkthrough

Welcome to another Hack the Box exercise. In this walkthrough, I have documented how I owned the Puppy machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs. You can also test and grow your penetration testing skills, from gathering information to reporting. If you are new to this blog, please do not forget to like, comment and subscribe to my YouTube channel and follow me on LinkedIn for more updates. About the Machine Puppy is an easy-difficulty Linux machine. The first step in pwning the Puppy machine like I have always done in my previous writeups is to connect my Kali Linux terminal with Hack the Box server. To establish this connection, I ran the following command in the terminal: Copy sudo openvpn puppy.ovpn Once the connection was successful, I started the target machine and I was assigned an IP address 10.10.11.70. The next step was adding puppy.htb to my /etc/hos...

Editor HTB Walkthrough

Welcome to another Hack the Box exercise. In this walkthrough, I have documented how I owned the Editor machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs. You can also test and grow your penetration testing skills, from gathering information to reporting. If you are new to this blog, please do not forget to like, comment and subscribe to my YouTube channel and follow me on LinkedIn for more updates. About the Machine Editor is an Easy Linux machine that combines web exploitation, credential reuse, and privilege escalation in a realistic attack chain. The initial foothold is obtained by exploiting a vulnerable version of XWiki (CVE-2025-24893) running on port 8080, which allows remote code execution and provides shell access as the low-privileged xwiki user. Further enumeration of configuration files reveals database credentials that are reused by the system user oliver , granting SSH acc...

Planning HTB Walkthrough

Welcome to another Hack the Box exercise. In this blog post, I will show you how I owned the Planning machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs. You can also test and grow your penetration testing skills, from gathering information to reporting. If you are new to this blog, please do not forget to like, comment, and subscribe to my YouTube channel and also follow me on LinkedIn for more updates. About the Machine Planning is an easy Linux machine on HackTheBox that demonstrates a well-paced attack chain involving reconnaissance, password reuse, enumeration of internal services, and Docker exploitation. The box is themed around a fictional project management environment where users manage infrastructure using tools like Grafana and Docker containers. Once on the box as a low-privileged user, we analyze cron jobs and discover a Docker container being regularly backed up. The backup pro...

Chemistry HTB Walkthrough

Welcome to another Hack the Box exercise. In this walkthrough, I have documented how I pwned the Chemistry machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs. You can also test and grow your penetration testing skills, from gathering information to reporting. If you are new to this blog, please do not forget to like, comment and subscribe to my YouTube channel ( https://www.youtube.com/@BoltechTechnologies1 ) and follow me on LinkedIn ( https://www.linkedin.com/in/isiaq-ibrahim-468588156/ ) for more updates. About the Machine Chemistry is an easy-difficulty Linux machine that showcases a Remote Code Execution (RCE) vulnerability in the `pymatgen` (CVE-2024-23346) Python library by uploading a malicious `CIF` file to the hosted `CIF Analyzer` website on the target. After discovering and cracking hashes, we authenticate to the target via SSH as `rosa` user. For privilege escalation, we expl...